Editing Devices
Jump to navigation
Jump to search
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 1: | Line 1: | ||
Note for ioctls: * indicates name is assumed from RE and may not be accurate. | Note for ioctls: * indicates name is assumed from RE and may not be accurate. | ||
== Device Listing == | == Device Listing == | ||
Note: only unique devices are listed. Benign devices like /dev/null are omitted for brevity's sake. | |||
{| class="wikitable sortable" | {| class="wikitable sortable" | ||
Line 19: | Line 14: | ||
| /dev/auditpipe || - || - | | /dev/auditpipe || - || - | ||
|- | |- | ||
| /dev/authmgr || | | /dev/authmgr || - || - | ||
|- | |- | ||
| /dev/az{1,ctl} || - || Audio-related | | /dev/az{1,ctl} || - || Audio-related | ||
Line 99: | Line 94: | ||
| /dev/hmd_* || VR || - | | /dev/hmd_* || VR || - | ||
|- | |- | ||
| /dev/iccnvs{0,1,2,4,6} || | | /dev/iccnvs{0,1,2,4,6} || - || - | ||
|- | |- | ||
| /dev/icc_configuration || ICC Config || - | | /dev/icc_configuration || ICC Config || - | ||
Line 125: | Line 120: | ||
| /dev/kmbp || - || - | | /dev/kmbp || - || - | ||
|- | |- | ||
| /dev/lvdctl || | | /dev/lvdctl || - || - | ||
|- | |- | ||
| /dev/lvd{0,1} || | | /dev/lvd{0,1} || - || - | ||
|- | |- | ||
| /dev/m2.ctl || m.2 NVMe Control? || - | | /dev/m2.ctl || m.2 NVMe Control? || - | ||
|- | |- | ||
| /dev/mbus || Event bus || - | | /dev/mbus || Event bus || - | ||
Line 167: | Line 160: | ||
| /dev/playgo_emu_param{1,2,3} || PlayGo emulator params || - | | /dev/playgo_emu_param{1,2,3} || PlayGo emulator params || - | ||
|- | |- | ||
| /dev/pltauth{0,1} || | | /dev/pltauth{0,1} || - || - | ||
|- | |- | ||
| /dev/pup_update0 || PUP Update || - | | /dev/pup_update0 || PUP Update || - | ||
|- | |- | ||
| /dev/qafutkn || QA flag / | | /dev/qafutkn || QA flag / utoken || - | ||
|- | |- | ||
| /dev/rnps || React Native PS || PSN related | | /dev/rnps || React Native PS || PSN related | ||
Line 179: | Line 172: | ||
| /dev/s3da || 3D Audio || - | | /dev/s3da || 3D Audio || - | ||
|- | |- | ||
| /dev/sbl_secreg || | | /dev/sbl_secreg || - || - | ||
|- | |- | ||
| /dev/sbl_srv || | | /dev/sbl_srv || - || Used by playready | ||
|- | |- | ||
| /dev/scanin || - || - | | /dev/scanin || - || - | ||
Line 191: | Line 184: | ||
| /dev/sflash0 || SPI flash || 2MB. Has EMC firmware and (non-secure) NVS. | | /dev/sflash0 || SPI flash || 2MB. Has EMC firmware and (non-secure) NVS. | ||
|- | |- | ||
| /dev/srtc || | | /dev/srtc || - || - | ||
|- | |- | ||
| /dev/ssd0.* || Internal SSD partitions || - | | /dev/ssd0.* || Internal SSD partitions || - | ||
Line 205: | Line 198: | ||
| /dev/uvd_{dec/enc/bgt} || Unified Video Decoder? || - | | /dev/uvd_{dec/enc/bgt} || Unified Video Decoder? || - | ||
|- | |- | ||
| /dev/wlanbt || | | /dev/wlanbt || - || - | ||
|- | |- | ||
| /dev/ | | /dev/xtp0 || - || - | ||
|} | |} | ||
== Platform Security Processor Core (PSP) (MP0) == | == Platform Security Processor Core (PSP) (MP0) == | ||
* All the fun things are here | |||
* All the fun things | * Named SMU PSP as well | ||
* Named | * Named ASP as well (AMD Secure Processor) | ||
== System Management Unit (SMU) (MP1) == | == System Management Unit (SMU) (MP1) == | ||
MP1 (System Management Unit or "SMU") is an xtensa CPU responsible for power management, clock management, sampling sensor data, and other power/thermal-related tasks. The /dev/mp1 device can be used to issue commands to it. Below are known commands. | MP1 (System Management Unit or "SMU") is an xtensa CPU responsible for power management, clock management, sampling sensor data, and other power/thermal-related tasks. The /dev/mp1 device can be used to issue commands to it. Below are known commands. | ||
Line 237: | Line 229: | ||
== Sensor Fusion Processor (SFP) (MP2) == | == Sensor Fusion Processor (SFP) (MP2) == | ||
* | * doesn't exist on ps5 | ||
* mainly for mobiles | |||
== Trusted Execution Environment (TEE) (MP3) == | == Trusted Execution Environment (TEE) (MP3) == | ||
MP3 consists of the Trusted Execution Environment (TEE) running on the AMD Platform Security Processor (PSP/SP). Its primary function is Digital Rights Management (DRM) via [https://www.microsoft.com/playready/features/EnhancedContentProtection.aspx PlayReady SL3000]. In userspace, the libSceTEEClient library is used for interfacing with it, which internally uses /dev/mp3 to load secure binaries (sbins) and establish sessions. Below are known commands. | |||
MP3 consists of the Trusted Execution Environment (TEE) running on the | |||
{| class="wikitable sortable" | {| class="wikitable sortable" | ||
|- | |- | ||
! IOCTL # !! Name !! Notes | ! IOCTL # !! Name !! Notes | ||
|- | |- | ||
| 0xC010B403 || TEE_IOC_INVOKE || Invoke commands | | 0xC010B403 || TEE_IOC_INVOKE || Invoke commands | ||
|- | |- | ||
| 0xC010B408 || TEE_IOC_DLM_GET_DEBUG_TOKEN || - | | 0xC010B408 || TEE_IOC_DLM_GET_DEBUG_TOKEN || - | ||
Line 279: | Line 259: | ||
== A53MM/A53IO (MP4) == | == A53MM/A53IO (MP4) == | ||
MP4, which consists of /dev/a53mm, /dev/a53mmsys, and /dev/a53io, is used for various tasks, and its overall purpose is not fully understood. Some of the things it includes are debugging (mdbg), video encode/decode, and other various memory-management related things. Below are known commands. | MP4, which consists of /dev/a53mm, /dev/a53mmsys, and /dev/a53io, is used for various tasks, and its overall purpose is not fully understood. Some of the things it includes are debugging (mdbg), video encode/decode, and other various memory-management related things. Below are known commands. | ||
Line 352: | Line 331: | ||
|- | |- | ||
! IOCTL # !! Name !! Notes | ! IOCTL # !! Name !! Notes | ||
|- | |- | ||
| 0xC03861A1 || BFS_A53IO_READ_BLOCK || - | | 0xC03861A1 || BFS_A53IO_READ_BLOCK || - | ||
|- | |- | ||
| 0xC03861A2 || BFS_A53IO_WRITE_BLOCK || - | | 0xC03861A2 || BFS_A53IO_WRITE_BLOCK || - | ||
|} | |} | ||
== Backup and Restore == | == Backup and Restore == | ||
Backup and Restore (BAR) is used by shellcore via /dev/bar. Below are known commands. | |||
Backup and Restore (BAR) is used by | |||
{| class="wikitable sortable" | {| class="wikitable sortable" | ||
Line 406: | Line 362: | ||
== Disc UID == | == Disc UID == | ||
Disc UID (/dev/duid) has its own library (libSceDiscId). It's unknown what this is used for at present. It has 2 known ioctls. | |||
Disc UID (/dev/duid) has its own library (libSceDiscId). It's unknown what this is used for at present. It has | |||
{| class="wikitable sortable" | {| class="wikitable sortable" | ||
Line 419: | Line 374: | ||
== Dynamic Library Debug == | == Dynamic Library Debug == | ||
Dynamic Lib Debug (/dev/dldbg) is used by the library for debugging syscore. Given the name, it's likely used for debugging sprx libs. Below are known commands. | Dynamic Lib Debug (/dev/dldbg) is used by the library for debugging syscore. Given the name, it's likely used for debugging sprx libs. Below are known commands. | ||
Line 435: | Line 389: | ||
== FTTRM == | == FTTRM == | ||
FTTRM's full purpose is unknown, but it's likely DRM-related. It's used by the Bluray app (BdmvPlayerCore, BdvdPlayerCore, UHDBdPlayerCore) via /dev/fttrm. There are only 2 known commands. | |||
FTTRM's full purpose is unknown, but it | |||
{| class="wikitable sortable" | {| class="wikitable sortable" | ||
Line 448: | Line 401: | ||
== ICC Floyd (TPM) == | == ICC Floyd (TPM) == | ||
The /dev/icc_floyd is for interacting with the floyd Trusted Platform Module (TPM) over ICC. It only has one known command. | The /dev/icc_floyd is for interacting with the floyd Trusted Platform Module (TPM) over ICC. It only has one known command. | ||
Line 456: | Line 408: | ||
|- | |- | ||
| 0x400EB701 || ICC_FLOYD_GET_VERSION || - | | 0x400EB701 || ICC_FLOYD_GET_VERSION || - | ||
|} | |} | ||
== Namespace Filesystem Control == | == Namespace Filesystem Control == | ||
The Namespace Filesystem (NSFS) is used by Virtual Shell (Vsh) and shellcore. It's critical to processes running on the system. Below are known commands. | |||
The Namespace Filesystem (NSFS) is used by Virtual Shell (Vsh) and | |||
{| class="wikitable sortable" | {| class="wikitable sortable" | ||
Line 497: | Line 429: | ||
== PFS Control == | == PFS Control == | ||
Playstation Filesystem (PFS) Control and /dev/pfsctldev is used internally for VSH. Below are known commands. | |||
Playstation | |||
{| class="wikitable sortable" | {| class="wikitable sortable" | ||
Line 528: | Line 459: | ||
== PFS Manager == | == PFS Manager == | ||
PFS Manager (/dev/pfsmgr) is used by shellcore. It handles trophy related tasks, savedata, and keystone verification. Below are known commands. | |||
PFS Manager (/dev/pfsmgr) is used by | |||
{| class="wikitable sortable" | {| class="wikitable sortable" | ||
Line 556: | Line 486: | ||
|- | |- | ||
| 0xC0A84B02 || PFSMGR_VERIFY_KEYSTONE || - | | 0xC0A84B02 || PFSMGR_VERIFY_KEYSTONE || - | ||
|} | |} | ||
== Root Param == | == Root Param == | ||
Root Param is used by shellcore to verify root param sfos (for PS4) or jsons (for PS5, aka PPR for ProsPeRo). Below are known commands. | |||
Root Param is used by | |||
{| class="wikitable sortable" | {| class="wikitable sortable" | ||
Line 610: | Line 500: | ||
|- | |- | ||
| 0xC0305203 || ROOTPARAM_RESUME_FROM_STANDBY || - | | 0xC0305203 || ROOTPARAM_RESUME_FROM_STANDBY || - | ||
|} | |} |